Segui
Lanier Watkins, PhD
Lanier Watkins, PhD
Principal Cybersecurity Researcher, Johns Hopkins University, APL & WSE
Email verificata su jhuapl.edu - Home page
Titolo
Citata da
Citata da
Anno
Securing commercial WiFi-based UAVs from common security attacks
M Hooper, Y Tian, R Zhou, B Cao, AP Lauf, L Watkins, WH Robinson, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1213-1218, 2016
1862016
A passive approach to rogue access point detection
L Watkins, R Beyah, C Corbett
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007
1032007
Detection of tunnels in PCAP data by random forests
AL Buczak, PA Hanke, GJ Cancro, MK Toma, LA Watkins, JS Chavis
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
732016
Identification of botnet activity in IoT network traffic using machine learning
M Hegde, G Kepnang, M Al Mazroei, JS Chavis, L Watkins
2020 International conference on intelligent data science technologies and …, 2020
382020
Using semi-supervised machine learning to address the big data problem in DNS networks
L Watkins, S Beck, J Zook, A Buczak, J Chavis, WH Robinson, JA Morales, ...
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
342017
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems
L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ...
Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security …, 2018
272018
Don’t drink the cyber: Extrapolating the possibilities of Oldsmar’s water treatment cyberattack
J Cervini, A Rubin, L Watkins
International conference on cyber warfare and security 17 (1), 19-25, 2022
262022
Measuring and mitigating bias in ai-chatbots
H Beattie, L Watkins, WH Robinson, A Rubin, S Watkins
2022 IEEE International Conference on Assured Autonomy (ICAA), 117-123, 2022
252022
A passive solution to the CPU resource discovery problem in cluster grid networks
L Watkins, WH Robinson, R Beyah
IEEE Transactions on Parallel and Distributed Systems 22 (12), 2000-2007, 2011
242011
Fighting banking botnets by exploiting inherent command and control vulnerabilities
L Watkins, C Kawka, C Corbett, WH Robinson
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
202014
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency
M Yue, WH Robinson, L Watkins, C Corbett
Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014
192014
Remotely inferring device manipulation of industrial control systems via network behavior
G Lontorfos, KD Fairbanks, L Watkins, WH Robinson
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
182015
An investigative study into an autonomous UAS traffic management system for congested airspace safety
L Watkins, N Sarfaraz, S Zanlongo, J Silbermann, T Young, R Sleight
2021 IEEE International Conference on Communications Workshops (ICC …, 2021
172021
Using network traffic to verify mobile device forensic artifacts
N Malik, J Chandramouli, P Suresh, K Fairbanks, L Watkins, ...
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
172017
Using network traffic to remotely identify the type of applications executing on mobile devices
L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson
Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013
172013
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system
R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ...
Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 195-223, 2017
162017
Agile services and analysis framework for autonomous and autonomic critical infrastructure
J Maurio, P Wood, S Zanlongo, J Silbermann, T Sookoor, A Lorenzo, ...
Innovations in Systems and Software Engineering 19 (2), 145-156, 2023
132023
Using network traffic to infer hardware state: A kernel-level investigation
L Watkins, WH Robinson, R Beyah
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-22, 2015
112015
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments
L Watkins, R Beyah, C Corbett
Proceedings of the first international conference on Networks for grid …, 2007
112007
Privacy violating opensource intelligence threat evaluation framework: a security assessment framework for critical infrastructure owners
A Cartagena, G Rimmer, T van Dalsen, L Watkins, WH Robinson, A Rubin
2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020
102020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20